US20050240678A1 - Method, system, and program for communicating data transfer requests between data transfer protocols - Google Patents

Method, system, and program for communicating data transfer requests between data transfer protocols Download PDF

Info

Publication number
US20050240678A1
US20050240678A1 US10/830,476 US83047604A US2005240678A1 US 20050240678 A1 US20050240678 A1 US 20050240678A1 US 83047604 A US83047604 A US 83047604A US 2005240678 A1 US2005240678 A1 US 2005240678A1
Authority
US
United States
Prior art keywords
data transfer
initiator
transfer protocol
request
write
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/830,476
Other versions
US7526574B2 (en
Inventor
John Hufferd
Michael Ko
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US10/830,476 priority Critical patent/US7526574B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KO, MICHAEL ANTHONY, HUFFERD, JOHN LEWIS
Publication of US20050240678A1 publication Critical patent/US20050240678A1/en
Application granted granted Critical
Publication of US7526574B2 publication Critical patent/US7526574B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/133Protocols for remote procedure calls [RPC]

Definitions

  • the present invention relates to a method, system, and program for communicating data transfer requests between data transfer protocols.
  • iSCSI Internet Small Computer Systems Interface
  • IP Internet Protocol
  • TCP Transmission Control Protocol
  • the Ethernet protocol provides for link-level error checking as the packets flow from point-to-point on any network segment (link) to determine whether data has been corrupted while passing on a link.
  • an initiator device transmits data or commands over the network to a target device.
  • the TCP/IP package includes an error detection code to perform an end-to-end checking to determine at the opposite end whether the transmitted packet has changed during the transmission as the packet passes through switches and routers.
  • a receiving device detecting an error will send a negative acknowledgment to the sending device to request retransmission of those packets in which errors were detected.
  • the Remote Direct Memory Access (RMDA) protocol provides the capability of one computer to directly place information in another computer's memory with minimal demands on memory bus bandwidth and processor overhead.
  • RDMA over TCP/IP also known as iWARP
  • iWARP iWARP
  • An RDMA Network Interface Card (RNIC) network adaptor card implements the RDMA protocol and performs RDMA operations to transfer data to local and remote memories.
  • RDMA Protocol Verbs Specification (Version 1.0)”, published by the RDMA Consortium (April, 2003); “Direct Data Placement over Reliable Transports (Version 1.0)”, published by RDMA Consortium (October 2002); and “Marker PDU Aligned Framing for TCP Specification (Version 1.0)”, published by the RDMA Consortium (October 2002), and which specifications are incorporated herein by reference in their entirety.
  • Data transfer systems including the RDMA and others described above, typically require the intervention of kernel mode processes to handle the read and write operations to and from the storage devices.
  • FIG. 1 illustrates an example of network nodes in which embodiments are implemented
  • FIG. 2 illustrates an example of a computing architecture in accordance with the described embodiments
  • FIG. 3 illustrates a packet format
  • FIG. 4 illustrates information maintained on a mapping
  • FIGS. 5, 6 , 7 , 8 , and 9 illustrate operations performed to transfer data in accordance with embodiments.
  • a request is received conforming to a first data transfer protocol at an initiator node to transmit to a target node, wherein the request includes a request identifier in the first data transfer protocol.
  • a reference is obtained to a memory location to use for the request using a second data transfer protocol, wherein the reference is used by the second data transfer protocol.
  • An entry is added to a map associating the reference to the memory location for the second data transfer protocol with the request identifier for the first data transfer protocol.
  • the second data transfer protocol is used to transfer the request with the request identifier and the reference to the memory location.
  • FIG. 1 illustrates a network computing environment comprised of a plurality of computing nodes 2 a , 2 b . . . 2 n that communicate over a network 4 .
  • the network may comprise a Local Area Network (LAN), Wide Area Network (WAN), Storage Area Network (SAN).
  • the nodes may communicate over a bus, such a SCSI bus, etc.
  • the nodes 2 a , 2 b . . . 2 n in FIG. 1 may operate as both initiators and targets.
  • FIG. 2 illustrates components included in a node, such as nodes 2 a , 2 b , 2 c , to enable communication over the network 4 .
  • a node 2 includes a processor 6 , such as a central processing unit or complex, and an operating system 8 .
  • the operating system 8 provides a user address space and kernel address space, where user applications 14 execute in the user address space and essential operations execute in the kernel address space, such as resource allocation, low-level hardware interfaces, security, etc.
  • An application 14 comprises a user application, such as a database program, server program, etc. To perform an I/O operation, the application 14 would make a call (directly or indirectly) to a SCSI layer 16 to generate a SCSI I/O request, which in turn would make a call to an iSCSI layer 18 , which in turn would call an iSER layer 20 to make calls to the RNIC 24 .
  • the iSER layer 20 may call the RNIC 24 directly through function calls or through the RNIC driver 22 .
  • the RNIC 24 includes an RDMA layer 26 and network layers 28 , such as a TCP layer, IP layer, and Ethernet layer, to package a packet in the transport layer for transmission over the network 4 or unpackage packets received from the network 4 .
  • the iSER functions called to handle the I/O request need to register a memory location in memory 30 to use for the I/O operation.
  • the registered memory locations may include memory regions and memory windows.
  • the RNIC 24 may directly access the registered memory location (locally or locally and remotely) in a logically contiguous fashion.
  • a defined memory location such as a memory region or memory window, is identified by a steering tag (“STag”) created by the RNIC 24 and used to reference the registered memory location, such as memory regions 32 .
  • STag steering tag
  • a memory region or subset of a memory region referred to as a memory window may be registered, where a separate STag would be associated with each registered memory location (region or window).
  • the RNIC 24 uses the STag to access the referenced memory location.
  • the iSER layer 20 would call the RNIC 22 to register the memory regions by calling an RNIC driver 22 .
  • the RNIC driver 22 comprises the device driver to interface the operating system 8 with the RNIC adaptor 24 .
  • the RNIC driver 22 In response to the call from the function in the iSER library to declare and register a memory location, e.g., memory region or window, the RNIC driver 22 would call the RNIC 24 .
  • the RNIC Driver 22 also sometimes called the “Verb” layer
  • the RDMA layer 26 in the RNIC 24 pins the memory location to register, such as memory regions (MRs) 32 , and generates an STag for the memory region.
  • MRs memory regions
  • the RNIC 24 RDMA layer 26 maintains a memory translation table 34 , and when registering a memory region, would add an entry to the memory translation table 34 identifying the registered memory region and the STag generated to reference that memory region to enable the RNIC 24 to associate the STag with the memory region.
  • the memory translation table 34 may be maintained within buffers in the RNIC 24 or within the memory 30 .
  • the STags would be returned to the iSER functions requesting the registration to use for I/O operations.
  • the iSER layer 20 may proceed with the I/O operation.
  • the iSER layer 20 would wrap the packet received from the iSCSI layer 18 with header information and the STag received from the RNIC 24 and pass the packet to the RNIC 24 to transfer.
  • the iSER layer 20 functions that interface with the RNIC 24 to perform the RDMA data transfer operation may execute in the user address space, thereby bypassing the RNIC driver 22 executing in the kernel space.
  • the RNIC 24 To manage RDMA data transfers, the RNIC 24 maintains a send queue 36 , a receive queue 38 , and a complete queue 40 .
  • the send queue 36 and receive queue 38 comprise the work queues that the RNIC 24 uses to manage RDMA data transfer requests.
  • the complete queue 40 may comprise a sharable queue containing one or more entries having completion entries to provide a single point of completion notification for multiple work queues.
  • the queues 36 , 38 , and 40 may have many instances, perhaps for each logical connection, and may be allocated by the RNIC 24 in the memory 30 or within buffers in the RNIC 24 .
  • FIG. 3 illustrates the format of a transmitted package used with the embodiments.
  • a SCSI command 50 (such as a read or write command), which is generated by the SCSI layer 16 , is encapsulated by the iSCSI layer 18 within an iSCSI protocol data unit (PDU) 52 , which is further encapsulated by the functions in the iSER layer 20 within an iSER header 54 .
  • the iSCSI PDU 52 including a SCSI command further 50 includes an initiator task tag (ITT) 56 , which the iSCSI layer 18 assigns to every issued iSCSI task, associated with an underlying SCSI command, to identify the underlying SCSI I/O operation.
  • ITT 56 uniquely identifies the task session wide.
  • the ITT is used to relate the response to the original request at the iSCSI layer 18 .
  • an ITT in the SCSI Response PDU from the target iSCSI layer 18 that is sent when the target has completed the operation and returns operational status, is used by the initiator iSCSI layer 18 to relate the target's PDU with the original SCSI write command.
  • the iSER header 54 would include STags used with the I/O operation and information indicating whether the remote node receiving the advertised STag is to read or write to the memory region (window) referenced by an STag and the work queues related to the request.
  • the iSER header 54 and iSCSI PDU 52 are further encapsulated in one or more additional network layers 60 , such as a TCP layer, IP layer, and/or Ethernet layer to allow transmission using these additional network protocols.
  • the network layers 28 in the RNIC 24 would assemble the iSER header 54 and PDU 52 within the additional network layers 60 , such as TCP, IP, Ethernet, etc.
  • the iSER layer 18 further maintains an ITT/STag map 70 that associates an ITT representing an iSCSI task with an STag that is used to transfer the data for that task, such as a read or write STag to cause the target node to read or write data through the RDMA channel.
  • FIG. 4 illustrates the content of an entry 72 in the map 70 , including a local/remote indicator 73 indicating whether the mapping is for a local or remote STag.
  • a local mapping entry associates an STag referencing a local memory window or region with an ITT that is used to store (or retrieve) data locally related to the I/O command and a remote mapping entry associates an STag referencing a memory region or window on a remote node with an ITT from which data is to be read or transferred to the local memory region or window.
  • the mapping entry 72 further includes the associated ITT 74 representing the iSCSI task, an STag 76 associated with that task, and status information 78 on the task.
  • FIGS. 5, 6 , and 7 illustrate operations to process a SCSI write command in accordance with described embodiments.
  • the iSCSI layer 18 calls (at block 102 ) the iSER layer 20 to perform an outbound transfer of the SCSI write command specifying the data area to be written.
  • the iSER layer 20 then calls (at block 104 ) the RNIC driver 22 to obtain STags for memory regions or windows including the data to write and to create work queues for the request.
  • the iSER layer 20 further constructs (at block 106 ) parameters for an RDMA Send which will transfer the iSCSI PDU, along with optionally a subset of the data (called immediate data) from the specified data area, and include an iSER header that contains a write STag that references the write data in the memory region 32 (or memory window).
  • the initiator iSER layer 20 determines (at block 108 ) the ITT 56 from the iSCSI PDU 52 ( FIG. 3 ) and creates a local mapping entry 72 ( FIG.
  • the iSER layer 20 transfers (at block 110 ) to the RNIC RDMA layer 26 RDMA “Send” parameters in order to send a message containing the iSCSI PDU 52 and advertising the write STag (via the iSER header 54 ) which the target node will use to read the remaining (not sent as immediate data) “SCSI Write” data from the Memory region (window) referenced by STag.
  • the initiator RNIC 24 uses (at block 112 ) the RDMA layer 26 and network layers 28 to transfer the message payload to the remote target node.
  • the iSER layer 20 at the target node receives (at block 150 ) the iSCSI PDU 52 with iSER headers 54 from the initiator for a SCSI write 50 .
  • the architecture described with respect to FIG. 2 is used to describe the components within both initiator and target nodes.
  • the target iSER layer 20 extracts (at block 152 ) the advertised write STag(s) from the iSER header 54 and the ITT 56 from the iSCSI PDU 52 and creates a remote mapping entry 72 ( FIG. 4 ) in the target ITT/STag map 70 associating the advertised remote write STag with the ITT, and indicates status of this command, such as “not completed”.
  • the target iSER layer 20 forwards (at block 154 ) the iSCSI PDU 52 , stripped of the iSER headers 54 , to the iSCSI layer 18 , which sends the SCSI command 50 to the SCSI layer 16 .
  • the target SCSI layer 16 upon receiving the SCSI command 50 from the iSCSI layer 18 , initializes (at block 156 ) buffers in memory 30 to receive the initiator write data and requests the write data when ready to receive the data.
  • the target iSCSI layer 18 in response to receiving the ready to transfer signal from the SCSI layer 16 , creates (at block 158 ) a return ready to transfer (R2T) PDU to request data from the initiator with the ITT from the initiator and transfers the R2T PDU to the iSER layer 20 .
  • the iSER layer 20 receives (at block 160 ) the R2T PDU from the iSCSI layer 18 and obtains/registers from the target RNIC RDMA layer 26 , via the RNIC driver 22 , a local STag referencing a target device's memory buffer, such as a memory region or window, to receive the write data from the initiator. This local target STag would be a read STag referencing the target device's buffers into which the initiator write data is transferred.
  • the iSER layer 20 further extracts (at block 162 ) the ITT 56 from the iSCSI R2T PDU, and adds an entry 72 ( FIG. 4 ) to the ITT/STag map 70 to associate the extracted ITT with the local read STag, which would be a local 72 entry.
  • the target ITT/STag map 70 includes two entries to associate the ITT with the local (read) and remote (write) STags used for the write operation.
  • the target iSER layer 20 uses (at block 164 ) the ITT 56 extracted from the iSCSI R2T PDU to locate the remote write STag from the entry added to the target ITT/STag map 70 at 152 .
  • the iSER layer 20 creates (at block 166 ) an RDMA read operation to read data specified by the remote (write) STag (data source) and transfer to data sink buffers referenced by the local (read) STag. This RDMA read operation is then transferred to the target RNIC 24 to execute.
  • the initiator RNIC 24 Upon receiving (at block 168 ) the RDMA read operation, the initiator RNIC 24 , through the RDMA layer 26 , accesses the write data directly from the initiator's memory using the source (write) STag and returns the requested data to the target RNIC in an RDMA read response message.
  • the target RNIC receives (at block 170 ) the RDMA read response message including requested write data and places the data in the target memory region referenced by the data sink (target local read) STag.
  • the target RNIC 24 signals (at block 172 ) completion to the target iSER layer 20 , which notifies the target iSCSI layer 18 .
  • the target iSCSI layer 18 informs the target SCSI layer 16 that the data has arrived, and then when the SCSI layer 16 signals that the operation is complete, the iSCSI 18 will issue (at block 174 ) a SCSI response PDU including the same ITT 56 used throughout the transaction.
  • the iSER layer 20 receives the SCSI response PDU and determines (at block 176 ) the ITT 56 in the SCSI response PDU and then removes or otherwise invalidates local and remote entries 72 ( FIG. 4 ) in its ITT/STag mapping 70 associated with that ITT, which would be the entries including the remote (write) STag and local (read) STag used for the write operation.
  • the iSER layer 20 includes (at block 178 ) the remote (write) STag referencing the write data in the initiator memory 30 in a “send with invalidate” message to the initiator node which also caries the SCSI Response PDU 52 .
  • FIG. 7 illustrates operations performed at the initiator upon receiving a “send with invalidate” message from the target.
  • the initiator RDMA layer 26 invalidates (at block 202 ) the write STag referencing the write data in the initiator memory specified in the message, where the write STag may be in the RDMA header of the message.
  • the initiator iSER layer 20 receives (at block 204 ) the SCSI response PDU and accesses the ITT 56 to determine the STags associated with ITT in the ITT/STag map 70 .
  • the initiator iSER layer 20 ignores the error and invokes (at block 208 ) the RNIC 24 directly to invalidate the STag. Real errors may be caught in the protocol at another point. From block 208 or the yes branch of block 206 (if there is a match, i.e., the initiator RNIC invalidated the correct STag), then the initiator iSER layer 20 invalidates (at block 210 ) any additional STags associated with ITT not in the iSER header of the “send with invalidate” message.
  • the initiator iSER Layer invalidates the write STag upon receiving the “send with invalidate” message because in certain implementations the RDMA header of the send with invalidate” may only carry one STag (in this case the Read STag) to be invalidated.
  • the iSER layer 20 (at block 212 ) returns the SCSI Response PDU 52 to the iSCSI layer and clears up its ITT/STag mapping table. The iSCSI layer 18 then informs the SCSI layer 16 the completion status of the operation.
  • FIGS. 8 and 9 illustrate operations performed to process a read command.
  • the iSCSI layer 18 In response to the iSCSI layer 18 receiving (at block 250 ) a SCSI read command PDU, the iSCSI layer 18 calls (at block 252 ) the initiator iSER layer 20 to perform an outbound transfer of a SCSI read command specifying the target device's data to read.
  • the initiator iSER layer 20 calls (at block 254 ) the RNIC driver 22 to obtain read STags for memory regions into which target data is transferred.
  • the iSER layer 20 constructs (at block 256 ) parameters for an RDMA Send which will transfer the SCSI read PDU 52 and include an iSER header 54 that contains the read STag that references the initiator memory region 32 (or window) to receive the target data.
  • the iSER layer 20 determines (at block 258 ) the ITT 56 from the iSCSI PDU 52 and creates a local mapping entry 72 ( FIG. 4 ) in the ITT/STag map 70 associating the ITT created by the initiator iSCSI layer 18 with the read STag that was added to the iSER header 54 , including an initial status such as “not completed”.
  • the iSER layer 20 transfers (at block 260 ) to the RNIC RDMA layer 26 the RDMA “Send” parameters in order to send a message containing the iSCSI PDU and advertising the read STag (via the iSER header 54 ).
  • the RNIC 24 uses (at block 262 ) the RDMA layer 26 and network layers 28 to transfer the message payload to the remote target node.
  • the target iSER layer 20 receives (at block 300 ) the iSCSI PDU 52 with the iSER headers 54 from the initiator for the SCSI read.
  • the target iSER layer 20 extracts (at block 302 ) the advertised read STag(s) of data to read from the iSER header 54 and the ITT 56 from the iSCSI PDU 52 and creates a remote mapping entry 72 in the target ITT/STag map 70 associating the extracted read STag and ITT.
  • the target iSER layer 20 forwards (at block 304 ) the iSCSI PDU 52 to the iSCSI layer 18 .
  • the iSCSI layer 18 forwards the SCSI read command 50 to the SCSI layer 16 , which would then ready the data for transfer in SCSI Data-in PDUs.
  • the target iSCSI layer 18 creates and sends to the iSER layer 20 (at block 306 ) an iSCSI Data-in PDU, in response to a “data ready” indication, and pointer to the data, from the SCSI layer, including the initiator ITT 56 in the iSCSI PDU 52 to transfer the requested data.
  • the target iSER layer 20 receives (at block 308 ) the iSCSI data-in PDU indicating the data to transfer.
  • the iSER layer 20 obtains/registers a local STag that references the local buffer which holds the “read” data to be sent to the initiator.
  • iSER 20 creates a mapping entry 72 in the targets ITT/STag mapping 70 associating the ITT to the local STag.
  • the target iSER layer uses (at block 310 ) the ITT in the iSCSI Data-in PDU to locate the remote read STag from the ITT/STag map 70 .
  • the iSER layer 20 creates (at block 312 ) an RDMA write operation to write data specified by the iSCSI Data-in PDU and uses the “Remote” (read) STag as a data sink STag of the RDMA write, and a “Local” STag, obtained from the RNIC 24 , as the data source STag to reference the Data specified by the iSCSI Data-in PDU.
  • the target RNIC 22 receives (at block 314 ) the RDMA write operation and transfers the received data to the memory in the initiator referenced by the data sink STag.
  • the target RDMA layer 26 in the RNIC 24 sends (at block 316 ) a completion message to the iSER layer 20 when completing the RDMA write.
  • the iSER layer which in-turn informs the iSCSI layer about the completion of the data transfer, and the iSCSI layer in turn informs the SCSI layer. This process continues until all the data transfers have been completed.
  • the target iSCSI layer indicates to the target iSCSI layer that all the data has been transferred, and gives the iSCSI layer the SCSI completion codes.
  • the iSCSI layer builds an appropriate SCSI Response PDU including the appropriate status and ITT.
  • the iSCSI layer passes the SCSI Response PDU to the iSER layer 20 which (in block 320 ) issues RDMA “Send with invalidate” message, which includes the remote STag which iSER retrieved, by using the ITT in the iSCSI response PDU, from the entry 72 in the target ITT/STag map 70 . (This is the same remote STag used in the RDMA writes that transferred the data.)
  • the entries 72 in the target ITT/STag map 70 are cleared, and the Local “STag” is made available for reuse.
  • the initiator would perform the operations described with respect to FIG. 7 to handle the “send with invalidate” message.
  • the iSCSI layer 18 called the iSER layer 20 .
  • other layers such as the SCSI layer 16 or application 14 , may build their own iSCSI PDUs and call the iSER layer 20 to implement SCSI read and write requests through RDMA calls made through the iSER library 20 .
  • the embodiments described herein may be implemented as a method, apparatus or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof.
  • article of manufacture refers to code or logic implemented in hardware logic (e.g., an integrated circuit chip, Programmable Gate Array (PGA), Application Specific Integrated Circuit (ASIC), etc.) or a computer readable medium, such as magnetic storage medium (e.g., hard disk drives, floppy disks, tape, etc.), optical storage (CD-ROMs, optical disks, etc.), volatile and non-volatile memory devices (e.g., EEPROMs, ROMs, PROMs, RAMs, DRAMs, SRAMs, firmware, programmable logic, etc.).
  • Code in the computer readable medium is accessed and executed by a processor.
  • the code in which preferred embodiments are implemented may further be accessible through a transmission media or from a file server over a network.
  • the article of manufacture in which the code is implemented may comprise a transmission media, such as a network transmission line, wireless transmission media, signals propagating through space, radio waves, infrared signals, etc.
  • the “article of manufacture” may comprise the medium in which the code is embodied.
  • the “article of manufacture” may comprise a combination of hardware and software components in which the code is embodied, processed, and executed.
  • the article of manufacture may comprise any information bearing medium known in the art.
  • circuitry refers to either hardware or software or a combination thereof.
  • the circuitry for performing the operations of the described embodiments may comprise a hardware device, such as an integrated circuit chip, Programmable Gate Array (PGA), Application Specific Integrated Circuit (ASIC), etc.
  • the circuitry may also comprise a processor component, such as an integrated circuit, and code in a computer readable medium, such as memory, wherein the code is executed by the processor to perform the operations of the described embodiments.
  • the RNIC 24 transferred RDMA messages within a TCP/IP packet.
  • the described embodiments are applicable to implementations using RDMA over TCP/IP or other network protocols, such as RDMA over Infiniband, CI (cLan, Servernet, etc.), Stream Control Transmission Protocol (“SCTP”), etc.
  • the physical layer utilized the Ethernet protocol.
  • alternative protocols providing link-to-link checksumming/CRCs (or other data detecting schemes) of the packet may be used instead of Ethernet, such as Serial Advanced Technology Attachment (SATA), Infiniband, serial attached SCSI cable, etc.
  • SATA Serial Advanced Technology Attachment
  • Infiniband Infiniband
  • serial attached SCSI cable etc.
  • the transport layer comprised the iSCSI protocol.
  • other protocols known in the art for transmitting I/O commands in packets and providing end-to-end checksumming/CRCs (or other data detecting schemes) may be used.
  • the packaged I/O commands comprised SCSI commands.
  • the commands may be in different I/O command formats than SCSI, such as Advanced Technology Attachment (ATA).
  • ATA Advanced Technology Attachment
  • the iSCSI layer made calls to the iSER layer to access the RDMA data transfer capabilities.
  • data transfer protocol layers other than iSCSI such as an application or other data transfer protocols, may call the iSER layer to access RDMA data transfer capabilities.
  • FIGS. 5, 6 , 7 , 8 , and 9 describe specific operations occurring in a particular order. In alternative implementations, certain operations may be performed in a different order, modified or removed. Moreover, steps may be added to the above described logic and still conform to the described implementations. Further, operations described herein may occur sequentially or certain operations may be processed in parallel. Yet further, operations may be performed by a single processing unit or by distributed processing units.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Provided are a method, system, and program for communicating data transfer requests between data transfer protocols A request is received conforming to a first data transfer protocol at an initiator node to transmit to a target node, wherein the request includes a request identifier in the first data transfer protocol. A reference is obtained to a memory location to use for the request using a second data transfer protocol, wherein the reference is used by the second data transfer protocol. An entry is added to a map associating the reference to the memory location for the second data transfer protocol with the request identifier for the first data transfer protocol. The second data transfer protocol is used to transfer the request with the request identifier and the reference to the memory location.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to a method, system, and program for communicating data transfer requests between data transfer protocols.
  • 2. Description of the Related Art
  • In storage environments, data access commands are communicated from a host system to a storage controller, which manages access to the disks. The storage controller may be a card inside the host system or a separate device. The Internet Small Computer Systems Interface (iSCSI) protocol is used for storage networks that utilize Ethernet connections, including Ethernet switches and routers. The term “iSCSI” as used herein refers to the syntax and semantic of the iSCSI protocol defined by the IETF (Internet Engineering Task Force) standards body, and any variant of that protocol. In current storage networks where iSCSI is utilized, the packet configuration comprises an Ethernet package encapsulating an Internet Protocol (IP) and Transmission Control Protocol (TCP) package layers, which further encapsulate an iSCSI package that includes one or more SCSI commands. The Ethernet protocol provides for link-level error checking as the packets flow from point-to-point on any network segment (link) to determine whether data has been corrupted while passing on a link. In network data transmission operations, an initiator device transmits data or commands over the network to a target device. The TCP/IP package includes an error detection code to perform an end-to-end checking to determine at the opposite end whether the transmitted packet has changed during the transmission as the packet passes through switches and routers. A receiving device detecting an error will send a negative acknowledgment to the sending device to request retransmission of those packets in which errors were detected.
  • The Remote Direct Memory Access (RMDA) protocol provides the capability of one computer to directly place information in another computer's memory with minimal demands on memory bus bandwidth and processor overhead. RDMA over TCP/IP (also known as iWARP) defines the interoperable protocols to support RDMA operations over standard TCP/IP networks. An RDMA Network Interface Card (RNIC) network adaptor card implements the RDMA protocol and performs RDMA operations to transfer data to local and remote memories. Further details of the RDMA protocol are described in the specifications entitled “RDMA Protocol Verbs Specification (Version 1.0)”, published by the RDMA Consortium (April, 2003); “Direct Data Placement over Reliable Transports (Version 1.0)”, published by RDMA Consortium (October 2002); and “Marker PDU Aligned Framing for TCP Specification (Version 1.0)”, published by the RDMA Consortium (October 2002), and which specifications are incorporated herein by reference in their entirety.
  • One specification entitled “iSCSI Extensions for RDMA Specification (Version 1.0), by Michael Ko et al., released by the RDMA Consortium (July, 2003), which specification is incorporated herein in its entirety, defines a protocol for providing the RDMA data transfer capabilities to iSCSI by layering iSCSI on top of RDMA.
  • Data transfer systems, including the RDMA and others described above, typically require the intervention of kernel mode processes to handle the read and write operations to and from the storage devices.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Referring now to the drawings in which like reference numbers represent corresponding parts throughout:
  • FIG. 1 illustrates an example of network nodes in which embodiments are implemented;
  • FIG. 2 illustrates an example of a computing architecture in accordance with the described embodiments;
  • FIG. 3 illustrates a packet format;
  • FIG. 4 illustrates information maintained on a mapping;
  • FIGS. 5, 6, 7, 8, and 9 illustrate operations performed to transfer data in accordance with embodiments.
  • SUMMARY
  • Provided are a method, system, and program for communicating data transfer requests between data transfer protocols A request is received conforming to a first data transfer protocol at an initiator node to transmit to a target node, wherein the request includes a request identifier in the first data transfer protocol. A reference is obtained to a memory location to use for the request using a second data transfer protocol, wherein the reference is used by the second data transfer protocol. An entry is added to a map associating the reference to the memory location for the second data transfer protocol with the request identifier for the first data transfer protocol. The second data transfer protocol is used to transfer the request with the request identifier and the reference to the memory location.
  • DETAILED DESCRIPTION
  • In the following description, reference is made to the accompanying drawings which form a part hereof and which illustrate several embodiments of the present invention. It is understood that other embodiments may be utilized and structural and operational changes may be made without departing from the scope of the present invention.
  • FIG. 1 illustrates a network computing environment comprised of a plurality of computing nodes 2 a, 2 b . . . 2 n that communicate over a network 4. The network may comprise a Local Area Network (LAN), Wide Area Network (WAN), Storage Area Network (SAN). Alternatively, the nodes may communicate over a bus, such a SCSI bus, etc.
  • The nodes 2 a, 2 b . . . 2 n in FIG. 1 may operate as both initiators and targets. FIG. 2 illustrates components included in a node, such as nodes 2 a, 2 b, 2 c, to enable communication over the network 4. A node 2 includes a processor 6, such as a central processing unit or complex, and an operating system 8. The operating system 8 provides a user address space and kernel address space, where user applications 14 execute in the user address space and essential operations execute in the kernel address space, such as resource allocation, low-level hardware interfaces, security, etc.
  • An application 14 comprises a user application, such as a database program, server program, etc. To perform an I/O operation, the application 14 would make a call (directly or indirectly) to a SCSI layer 16 to generate a SCSI I/O request, which in turn would make a call to an iSCSI layer 18, which in turn would call an iSER layer 20 to make calls to the RNIC 24. The iSER layer 20 may call the RNIC 24 directly through function calls or through the RNIC driver 22. The RNIC 24 includes an RDMA layer 26 and network layers 28, such as a TCP layer, IP layer, and Ethernet layer, to package a packet in the transport layer for transmission over the network 4 or unpackage packets received from the network 4.
  • In certain embodiments, to perform I/O operations, the iSER functions called to handle the I/O request need to register a memory location in memory 30 to use for the I/O operation. The registered memory locations may include memory regions and memory windows. The RNIC 24 may directly access the registered memory location (locally or locally and remotely) in a logically contiguous fashion. A defined memory location, such as a memory region or memory window, is identified by a steering tag (“STag”) created by the RNIC 24 and used to reference the registered memory location, such as memory regions 32. In certain embodiments, a memory region or subset of a memory region referred to as a memory window may be registered, where a separate STag would be associated with each registered memory location (region or window). The RNIC 24 uses the STag to access the referenced memory location. In certain embodiments, the iSER layer 20 would call the RNIC 22 to register the memory regions by calling an RNIC driver 22. The RNIC driver 22 comprises the device driver to interface the operating system 8 with the RNIC adaptor 24. In response to the call from the function in the iSER library to declare and register a memory location, e.g., memory region or window, the RNIC driver 22 would call the RNIC 24. The RNIC Driver 22 (also sometimes called the “Verb” layer) along with the RDMA layer 26 in the RNIC 24 pins the memory location to register, such as memory regions (MRs) 32, and generates an STag for the memory region.
  • The RNIC 24 RDMA layer 26 maintains a memory translation table 34, and when registering a memory region, would add an entry to the memory translation table 34 identifying the registered memory region and the STag generated to reference that memory region to enable the RNIC 24 to associate the STag with the memory region. The memory translation table 34 may be maintained within buffers in the RNIC 24 or within the memory 30. The STags would be returned to the iSER functions requesting the registration to use for I/O operations.
  • After the RNIC 24 generates and returns STags to the iSER layer 20, the iSER layer 20 may proceed with the I/O operation. The iSER layer 20 would wrap the packet received from the iSCSI layer 18 with header information and the STag received from the RNIC 24 and pass the packet to the RNIC 24 to transfer. The iSER layer 20 functions that interface with the RNIC 24 to perform the RDMA data transfer operation may execute in the user address space, thereby bypassing the RNIC driver 22 executing in the kernel space.
  • To manage RDMA data transfers, the RNIC 24 maintains a send queue 36, a receive queue 38, and a complete queue 40. The send queue 36 and receive queue 38 comprise the work queues that the RNIC 24 uses to manage RDMA data transfer requests. The complete queue 40 may comprise a sharable queue containing one or more entries having completion entries to provide a single point of completion notification for multiple work queues. The queues 36, 38, and 40 may have many instances, perhaps for each logical connection, and may be allocated by the RNIC 24 in the memory 30 or within buffers in the RNIC 24.
  • FIG. 3 illustrates the format of a transmitted package used with the embodiments. A SCSI command 50 (such as a read or write command), which is generated by the SCSI layer 16, is encapsulated by the iSCSI layer 18 within an iSCSI protocol data unit (PDU) 52, which is further encapsulated by the functions in the iSER layer 20 within an iSER header 54. The iSCSI PDU 52 including a SCSI command further 50 includes an initiator task tag (ITT) 56, which the iSCSI layer 18 assigns to every issued iSCSI task, associated with an underlying SCSI command, to identify the underlying SCSI I/O operation. The ITT 56 uniquely identifies the task session wide. When the target node responds to a request from the initiator, the ITT is used to relate the response to the original request at the iSCSI layer 18. For instance, an ITT in the SCSI Response PDU from the target iSCSI layer 18, that is sent when the target has completed the operation and returns operational status, is used by the initiator iSCSI layer 18 to relate the target's PDU with the original SCSI write command.
  • The iSER header 54 would include STags used with the I/O operation and information indicating whether the remote node receiving the advertised STag is to read or write to the memory region (window) referenced by an STag and the work queues related to the request. The iSER header 54 and iSCSI PDU 52 are further encapsulated in one or more additional network layers 60, such as a TCP layer, IP layer, and/or Ethernet layer to allow transmission using these additional network protocols. In certain embodiments, the network layers 28 in the RNIC 24 would assemble the iSER header 54 and PDU 52 within the additional network layers 60, such as TCP, IP, Ethernet, etc.
  • The iSER layer 18 further maintains an ITT/STag map 70 that associates an ITT representing an iSCSI task with an STag that is used to transfer the data for that task, such as a read or write STag to cause the target node to read or write data through the RDMA channel. FIG. 4 illustrates the content of an entry 72 in the map 70, including a local/remote indicator 73 indicating whether the mapping is for a local or remote STag. A local mapping entry associates an STag referencing a local memory window or region with an ITT that is used to store (or retrieve) data locally related to the I/O command and a remote mapping entry associates an STag referencing a memory region or window on a remote node with an ITT from which data is to be read or transferred to the local memory region or window. The mapping entry 72 further includes the associated ITT 74 representing the iSCSI task, an STag 76 associated with that task, and status information 78 on the task.
  • FIGS. 5, 6, and 7 illustrate operations to process a SCSI write command in accordance with described embodiments. With respect to FIG. 5, in response to receiving (at block 100) a SCSI write command, the iSCSI layer 18 calls (at block 102) the iSER layer 20 to perform an outbound transfer of the SCSI write command specifying the data area to be written. The iSER layer 20 then calls (at block 104) the RNIC driver 22 to obtain STags for memory regions or windows including the data to write and to create work queues for the request. (This can also be done ahead of time and an available STag can be retrieved from a pool of STags) The iSER layer 20 further constructs (at block 106) parameters for an RDMA Send which will transfer the iSCSI PDU, along with optionally a subset of the data (called immediate data) from the specified data area, and include an iSER header that contains a write STag that references the write data in the memory region 32 (or memory window). The initiator iSER layer 20 determines (at block 108) the ITT 56 from the iSCSI PDU 52 (FIG. 3) and creates a local mapping entry 72 (FIG. 4) in the ITT/STag mapping associating the determined ITT with the write STag referencing the data to write from the initiator memory 30 along with initial status such as “not completed”. The write STag is included in the iSER header 54. The iSER layer 20 transfers (at block 110) to the RNIC RDMA layer 26 RDMA “Send” parameters in order to send a message containing the iSCSI PDU 52 and advertising the write STag (via the iSER header 54) which the target node will use to read the remaining (not sent as immediate data) “SCSI Write” data from the Memory region (window) referenced by STag. The initiator RNIC 24 uses (at block 112) the RDMA layer 26 and network layers 28 to transfer the message payload to the remote target node.
  • With respect to FIG. 6 illustrating the target node operations, the iSER layer 20 at the target node receives (at block 150) the iSCSI PDU 52 with iSER headers 54 from the initiator for a SCSI write 50. The architecture described with respect to FIG. 2 is used to describe the components within both initiator and target nodes. The target iSER layer 20 extracts (at block 152) the advertised write STag(s) from the iSER header 54 and the ITT 56 from the iSCSI PDU 52 and creates a remote mapping entry 72 (FIG. 4) in the target ITT/STag map 70 associating the advertised remote write STag with the ITT, and indicates status of this command, such as “not completed”. The target iSER layer 20 forwards (at block 154) the iSCSI PDU 52, stripped of the iSER headers 54, to the iSCSI layer 18, which sends the SCSI command 50 to the SCSI layer 16. The target SCSI layer 16, upon receiving the SCSI command 50 from the iSCSI layer 18, initializes (at block 156) buffers in memory 30 to receive the initiator write data and requests the write data when ready to receive the data. The target iSCSI layer 18, in response to receiving the ready to transfer signal from the SCSI layer 16, creates (at block 158) a return ready to transfer (R2T) PDU to request data from the initiator with the ITT from the initiator and transfers the R2T PDU to the iSER layer 20. The iSER layer 20 receives (at block 160) the R2T PDU from the iSCSI layer 18 and obtains/registers from the target RNIC RDMA layer 26, via the RNIC driver 22, a local STag referencing a target device's memory buffer, such as a memory region or window, to receive the write data from the initiator. This local target STag would be a read STag referencing the target device's buffers into which the initiator write data is transferred.
  • The iSER layer 20 further extracts (at block 162) the ITT 56 from the iSCSI R2T PDU, and adds an entry 72 (FIG. 4) to the ITT/STag map 70 to associate the extracted ITT with the local read STag, which would be a local 72 entry. At this point, the target ITT/STag map 70 includes two entries to associate the ITT with the local (read) and remote (write) STags used for the write operation. The target iSER layer 20 uses (at block 164) the ITT 56 extracted from the iSCSI R2T PDU to locate the remote write STag from the entry added to the target ITT/STag map 70 at 152. The iSER layer 20 creates (at block 166) an RDMA read operation to read data specified by the remote (write) STag (data source) and transfer to data sink buffers referenced by the local (read) STag. This RDMA read operation is then transferred to the target RNIC 24 to execute.
  • Upon receiving (at block 168) the RDMA read operation, the initiator RNIC 24, through the RDMA layer 26, accesses the write data directly from the initiator's memory using the source (write) STag and returns the requested data to the target RNIC in an RDMA read response message. The target RNIC receives (at block 170) the RDMA read response message including requested write data and places the data in the target memory region referenced by the data sink (target local read) STag. The target RNIC 24 signals (at block 172) completion to the target iSER layer 20, which notifies the target iSCSI layer 18. The target iSCSI layer 18 informs the target SCSI layer 16 that the data has arrived, and then when the SCSI layer 16 signals that the operation is complete, the iSCSI 18 will issue (at block 174) a SCSI response PDU including the same ITT 56 used throughout the transaction. The iSER layer 20 receives the SCSI response PDU and determines (at block 176) the ITT 56 in the SCSI response PDU and then removes or otherwise invalidates local and remote entries 72 (FIG. 4) in its ITT/STag mapping 70 associated with that ITT, which would be the entries including the remote (write) STag and local (read) STag used for the write operation. The iSER layer 20 includes (at block 178) the remote (write) STag referencing the write data in the initiator memory 30 in a “send with invalidate” message to the initiator node which also caries the SCSI Response PDU 52.
  • FIG. 7 illustrates operations performed at the initiator upon receiving a “send with invalidate” message from the target. In response to receiving (at block 200) the “send with invalidate” message from the target RNIC 24, the initiator RDMA layer 26 invalidates (at block 202) the write STag referencing the write data in the initiator memory specified in the message, where the write STag may be in the RDMA header of the message. The initiator iSER layer 20 receives (at block 204) the SCSI response PDU and accesses the ITT 56 to determine the STags associated with ITT in the ITT/STag map 70. If (at block 206) the STag in the “send with invalidate” message does not match the STag in the entry 72 in the ITT/STag mapping 70 associated with the ITT included in the message, then the initiator iSER layer 20 ignores the error and invokes (at block 208) the RNIC 24 directly to invalidate the STag. Real errors may be caught in the protocol at another point. From block 208 or the yes branch of block 206 (if there is a match, i.e., the initiator RNIC invalidated the correct STag), then the initiator iSER layer 20 invalidates (at block 210) any additional STags associated with ITT not in the iSER header of the “send with invalidate” message. If both a read and a write STag were advertised earlier (for a bidirectional command), then the initiator iSER Layer invalidates the write STag upon receiving the “send with invalidate” message because in certain implementations the RDMA header of the send with invalidate” may only carry one STag (in this case the Read STag) to be invalidated. The iSER layer 20 (at block 212) returns the SCSI Response PDU 52 to the iSCSI layer and clears up its ITT/STag mapping table. The iSCSI layer 18 then informs the SCSI layer 16 the completion status of the operation.
  • FIGS. 8 and 9 illustrate operations performed to process a read command. In response to the iSCSI layer 18 receiving (at block 250) a SCSI read command PDU, the iSCSI layer 18 calls (at block 252) the initiator iSER layer 20 to perform an outbound transfer of a SCSI read command specifying the target device's data to read. The initiator iSER layer 20 calls (at block 254) the RNIC driver 22 to obtain read STags for memory regions into which target data is transferred. (This can also be done ahead of time and an available STag can be retrieved from a pool of STags) The iSER layer 20 constructs (at block 256) parameters for an RDMA Send which will transfer the SCSI read PDU 52 and include an iSER header 54 that contains the read STag that references the initiator memory region 32 (or window) to receive the target data. The iSER layer 20 determines (at block 258) the ITT 56 from the iSCSI PDU 52 and creates a local mapping entry 72 (FIG. 4) in the ITT/STag map 70 associating the ITT created by the initiator iSCSI layer 18 with the read STag that was added to the iSER header 54, including an initial status such as “not completed”. The iSER layer 20 transfers (at block 260) to the RNIC RDMA layer 26 the RDMA “Send” parameters in order to send a message containing the iSCSI PDU and advertising the read STag (via the iSER header 54). The RNIC 24 uses (at block 262) the RDMA layer 26 and network layers 28 to transfer the message payload to the remote target node.
  • With respect to FIG. 9 describing the read operations at the target node, the target iSER layer 20 receives (at block 300) the iSCSI PDU 52 with the iSER headers 54 from the initiator for the SCSI read. The target iSER layer 20 extracts (at block 302) the advertised read STag(s) of data to read from the iSER header 54 and the ITT 56 from the iSCSI PDU 52 and creates a remote mapping entry 72 in the target ITT/STag map 70 associating the extracted read STag and ITT. The target iSER layer 20 forwards (at block 304) the iSCSI PDU 52 to the iSCSI layer 18. The iSCSI layer 18 forwards the SCSI read command 50 to the SCSI layer 16, which would then ready the data for transfer in SCSI Data-in PDUs. The target iSCSI layer 18 creates and sends to the iSER layer 20 (at block 306) an iSCSI Data-in PDU, in response to a “data ready” indication, and pointer to the data, from the SCSI layer, including the initiator ITT 56 in the iSCSI PDU 52 to transfer the requested data.
  • The target iSER layer 20 receives (at block 308) the iSCSI data-in PDU indicating the data to transfer. The iSER layer 20 obtains/registers a local STag that references the local buffer which holds the “read” data to be sent to the initiator. iSER 20 creates a mapping entry 72 in the targets ITT/STag mapping 70 associating the ITT to the local STag. The target iSER layer uses (at block 310) the ITT in the iSCSI Data-in PDU to locate the remote read STag from the ITT/STag map 70. The iSER layer 20 creates (at block 312) an RDMA write operation to write data specified by the iSCSI Data-in PDU and uses the “Remote” (read) STag as a data sink STag of the RDMA write, and a “Local” STag, obtained from the RNIC 24, as the data source STag to reference the Data specified by the iSCSI Data-in PDU. The target RNIC 22 receives (at block 314) the RDMA write operation and transfers the received data to the memory in the initiator referenced by the data sink STag.
  • The target RDMA layer 26 in the RNIC 24 sends (at block 316) a completion message to the iSER layer 20 when completing the RDMA write. The iSER layer which in-turn informs the iSCSI layer about the completion of the data transfer, and the iSCSI layer in turn informs the SCSI layer. This process continues until all the data transfers have been completed. Then (in block 318) the target iSCSI layer indicates to the target iSCSI layer that all the data has been transferred, and gives the iSCSI layer the SCSI completion codes. The iSCSI layer builds an appropriate SCSI Response PDU including the appropriate status and ITT. The iSCSI layer passes the SCSI Response PDU to the iSER layer 20 which (in block 320) issues RDMA “Send with invalidate” message, which includes the remote STag which iSER retrieved, by using the ITT in the iSCSI response PDU, from the entry 72 in the target ITT/STag map 70. (This is the same remote STag used in the RDMA writes that transferred the data.) At the completion of the send (at block 322), the entries 72 in the target ITT/STag map 70 are cleared, and the Local “STag” is made available for reuse. Upon receiving the “send with invalidate” message, the initiator would perform the operations described with respect to FIG. 7 to handle the “send with invalidate” message.
  • In the described operations, the iSCSI layer 18 called the iSER layer 20. In alternative embodiments, other layers, such as the SCSI layer 16 or application 14, may build their own iSCSI PDUs and call the iSER layer 20 to implement SCSI read and write requests through RDMA calls made through the iSER library 20.
  • Additional Embodiment Details
  • The embodiments described herein may be implemented as a method, apparatus or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof. The term “article of manufacture” as used herein refers to code or logic implemented in hardware logic (e.g., an integrated circuit chip, Programmable Gate Array (PGA), Application Specific Integrated Circuit (ASIC), etc.) or a computer readable medium, such as magnetic storage medium (e.g., hard disk drives, floppy disks, tape, etc.), optical storage (CD-ROMs, optical disks, etc.), volatile and non-volatile memory devices (e.g., EEPROMs, ROMs, PROMs, RAMs, DRAMs, SRAMs, firmware, programmable logic, etc.). Code in the computer readable medium is accessed and executed by a processor. The code in which preferred embodiments are implemented may further be accessible through a transmission media or from a file server over a network. In such cases, the article of manufacture in which the code is implemented may comprise a transmission media, such as a network transmission line, wireless transmission media, signals propagating through space, radio waves, infrared signals, etc. Thus, the “article of manufacture” may comprise the medium in which the code is embodied. Additionally, the “article of manufacture” may comprise a combination of hardware and software components in which the code is embodied, processed, and executed. Of course, those skilled in the art will recognize that many modifications may be made to this configuration without departing from the scope of the present invention, and that the article of manufacture may comprise any information bearing medium known in the art.
  • The described operations may be performed by circuitry, where “circuitry” refers to either hardware or software or a combination thereof. The circuitry for performing the operations of the described embodiments may comprise a hardware device, such as an integrated circuit chip, Programmable Gate Array (PGA), Application Specific Integrated Circuit (ASIC), etc. The circuitry may also comprise a processor component, such as an integrated circuit, and code in a computer readable medium, such as memory, wherein the code is executed by the processor to perform the operations of the described embodiments.
  • In the described embodiments, the RNIC 24 transferred RDMA messages within a TCP/IP packet. The described embodiments are applicable to implementations using RDMA over TCP/IP or other network protocols, such as RDMA over Infiniband, CI (cLan, Servernet, etc.), Stream Control Transmission Protocol (“SCTP”), etc.
  • In the described implementations, the physical layer utilized the Ethernet protocol. In alternative implementations, alternative protocols providing link-to-link checksumming/CRCs (or other data detecting schemes) of the packet may be used instead of Ethernet, such as Serial Advanced Technology Attachment (SATA), Infiniband, serial attached SCSI cable, etc.
  • In described implementations, the transport layer comprised the iSCSI protocol. In alternative implementations other protocols known in the art for transmitting I/O commands in packets and providing end-to-end checksumming/CRCs (or other data detecting schemes) may be used.
  • In the described implementations, the packaged I/O commands comprised SCSI commands. In alternative implementations, the commands may be in different I/O command formats than SCSI, such as Advanced Technology Attachment (ATA).
  • In described embodiments, the iSCSI layer made calls to the iSER layer to access the RDMA data transfer capabilities. In additional embodiments, data transfer protocol layers other than iSCSI, such as an application or other data transfer protocols, may call the iSER layer to access RDMA data transfer capabilities.
  • FIGS. 5, 6, 7, 8, and 9 describe specific operations occurring in a particular order. In alternative implementations, certain operations may be performed in a different order, modified or removed. Moreover, steps may be added to the above described logic and still conform to the described implementations. Further, operations described herein may occur sequentially or certain operations may be processed in parallel. Yet further, operations may be performed by a single processing unit or by distributed processing units.
  • The foregoing description of the implementations has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended hereto. The above specification, examples and data provide a complete description of the manufacture and use of the composition of the invention. Since many implementations of the invention can be made without departing from the spirit and scope of the invention, the invention resides in the claims hereinafter appended.

Claims (36)

1. An article of manufacture for communicating data requests between an initiator node and a target node, wherein the article of manufacture is operable to cause operations comprising:
receiving a request conforming to a first data transfer protocol at the initiator node to transmit to the target node, wherein the request includes a request identifier in the first data transfer protocol;
obtaining a reference to a memory location to use for the request using a second data transfer protocol, wherein the reference is used by the second data transfer protocol;
adding an entry to a map associating the reference to the memory location for the second data transfer protocol with the request identifier for the first data transfer protocol; and
transferring, using the second data transfer protocol, the request with the request identifier and the reference to the memory location.
2. The article of manufacture of claim 1, wherein the request originates at the initiator node and comprises a write command to write data from the initiator node to the target node to which the request is transferred using the second data transfer protocol, and wherein the reference comprises a write reference identifying initiator memory at the initiator node including the data to write to the target node.
3. The article of manufacture of claim 2, wherein the map comprises an initiator map at the initiator node, wherein the operations further comprise:
receiving, at the target node, the request transferred using the second data transfer protocol, with the request identifier and the write reference;
adding an entry to a target map at the target node associating the write reference with the request identifier.
4. The article of manufacture of claim 3, wherein the operations further comprise:
obtaining a read reference to a target memory location at the target node to receive the write data in the second data transfer protocol;
adding an entry to the target map associating the read reference with the request identifier; and
generating, at the target node, a read request in the second data transfer protocol specifying to transfer the data in the initiator memory referenced by the write reference to the target memory referenced by the read reference, wherein the target node transfers the read request to the initiator.
5. The article of manufacture of claim 1, wherein the request originates at the initiator node and comprises a read command to read data from the target node to which the request is transferred using the second data transfer protocol, wherein the reference comprises a read reference identifying initiator memory at the initiator node into which the data from the target node is to be transferred.
6. The article of manufacture of claims 2 and 5, wherein the operations further comprise:
receiving an invalidate message in the second data transfer protocol from the target node including one reference in the second data transfer protocol and the request identifier in the first data transfer protocol; and
invalidating the read or write reference not included in the invalidated message;
7. The article of manufacture of claim 5, wherein the map comprises an initiator map at the initiator node, and wherein the operations further comprise:
receiving, at the target node, the read request transferred using the second data transfer protocol, with the request identifier and the read reference; and
adding an entry to a target map at the target node associating the read reference with the request identifier.
8. The article of manufacture of claim 7, wherein the operations further comprise:
identifying the requested data at the target node as a write reference;
adding an entry to the target map associating the identified write reference with the request identifier;
determining from the target map the read reference and the write reference; and
generating a write operation in the second data transfer protocol including the read reference and write reference to write the requested data to the initiator memory location referenced by the read reference from the location referenced by the read reference.
9. The article of manufacture of claim 1, wherein the map comprises an initiator map, and wherein the operations further comprise:
receiving an invalidate message in the second data transfer protocol from the target node including one reference in the second data transfer protocol and the request identifier in the first data transfer protocol;
invalidating, with adaptor hardware in the initiator node, the reference in the invalidate message;
determining, with an adaptor driver in the initiator node, from the map the at least one reference associated with the request identifier in the invalidate message; and
determining, with the adaptor driver, whether the invalidated reference in the invalidate message matches one reference in the determined at least one reference from the map;
invalidating, with the adaptor driver, one reference in the initiator map, and ignoring the error condition if the invalidated reference does not match the determined reference.
10. The article of manufacture of claim 9, wherein the target node invalidates the references in the target node map related by the identifier in the first data transfer protocol.
11. The article of manufacture of claim 9, wherein the request comprises a write request, wherein the map includes two entries associated with the request identifier, one write reference identifying initiator memory at the initiator node including the data to write and one read reference identifying target memory at the target node into which the data to write is transferred at the target, wherein the determined at least one reference comprises the write and read references, wherein the operations further comprise:
invalidating the reference in one of the two determined entries not included in the invalidate message.
12. The article of manufacture of claim 1, wherein the request comprises a SCSI I/O command, wherein the first data transfer protocol comprises iSCSI, wherein the second data transfer protocol comprises RDMA, and wherein an iSER layer performs the operations of obtaining the reference to the memory location and adding the entry to the map.
13. A system for transferring between an initiator node and a target node, comprising:
initiator circuitry operable when functioning as the initiator node and operable to perform:
(i) receiving a request conforming to a first data transfer protocol at an initiator node to transmit to a target node, wherein the request includes a request identifier in the first data transfer protocol;
(ii) obtaining a reference to a memory location to use for the request using a second data transfer protocol, wherein the reference is used by the second data transfer protocol;
(iii) adding an entry to a map associating the reference to the memory location for the second data transfer protocol with the request identifier for the first data transfer protocol; and
(iv) transferring, using the second data transfer protocol, the request with the request identifier and the reference to the memory location.
14. The system of claim 13, wherein the request originates at the initiator node and comprises a write command to write data from the initiator node to the target node to which the request is transferred using the second data transfer protocol, and wherein the reference comprises a write reference identifying initiator memory at the initiator node including the data to write to the target node.
15. The system of claim 14, wherein the map comprises an initiator map at the initiator node, further comprising:
target circuitry operable when functioning as the target node and operable to perform:
(i) receiving, at the target node, the request transferred using the second data transfer protocol, with the request identifier and the write reference; and
(ii) adding an entry to a target map at the target node associating the write reference with the request identifier.
16. The system of claim 15, wherein the target circuitry is further operable to perform:
obtaining a read reference to a target memory location at the target node to receive the write data in the second data transfer protocol;
adding an entry to the target map associating the read reference with the request identifier; and
generating a read request in the second data transfer protocol specifying to transfer the data in the initiator memory referenced by the write reference to the target memory referenced by the read reference, wherein the target node transfers the read request to the initiator.
17. The system of claim 13, wherein the request originates at the initiator node and comprises a read command to read data from the target node to which the request is transferred using the second data transfer protocol, wherein the reference comprises a read reference identifying initiator memory at the initiator node into which the data from the target node is to be transferred.
18. The system of claims 14 and 17, wherein the initiator circuitry is further operable to perform:
receiving an invalidate message in the second data transfer protocol from the target node including one reference in the second data transfer protocol and the request identifier in the first data transfer protocol; and
invalidating the read or write reference not included in the invalidated message;
19. The system of claim 17, wherein the map comprises an initiator map at the initiator node, further comprising:
target circuitry operable when functioning as the target node and operable to perform:
(i) receiving the read request transferred using the second data transfer protocol, with the request identifier and the read reference; and
(ii) adding an entry to a target map at the target node associating the read reference with the request identifier.
20. The system of claim 19, wherein the target circuitry is further operable to perform:
identifying the requested data at the target node as a write reference;
adding an entry to the target map associating the identified write reference with the request identifier;
determining from the target map the read reference and the write reference; and
generating a write operation in the second data transfer protocol including the read reference and write reference to write the requested data to the initiator memory location referenced by the read reference from the location referenced by the read reference.
21. The system of claim 13, wherein the map comprises an initiator map, wherein the initiator circuitry is further operable to perform:
receiving an invalidate message in the second data transfer protocol from the target node including one reference in the second data transfer protocol and the request identifier in the first data transfer protocol;
invalidating, with adaptor hardware in the initiator node, the reference in the invalidate message;
determining, with an adaptor driver in the initiator node, from the map the at least one reference associated with the request identifier in the invalidate message; and
determining, with the adaptor driver, whether the invalidated reference in the invalidate message matches one reference in the determined at least one reference from the map;
invalidating, with the adaptor driver, one reference in the initiator map, and ignoring the error condition if the invalidated reference does not match the determined reference.
22. The system of claim 21, wherein the target node invalidates the references in the target node map related by the identifier in the first data transfer protocol.
23. The system of claim 21, wherein the request comprises a write request, wherein the map includes two entries associated with the request identifier, one write reference identifying initiator memory at the initiator node including the data to write and one read reference identifying target memory at the target node into which the data to write is transferred at the target, wherein the determined at least one reference comprises the write and read references, and wherein the initiator circuitry is further operable to perform:
invalidating the reference in one of the two determined entries not included in the invalidate message.
24. The system of claim 1, wherein the request comprises a SCSI I/O command, wherein the first data transfer protocol comprises iSCSI, wherein the second data transfer protocol comprises RDMA, and wherein an iSER layer performs the operations of obtaining the reference to the memory location and adding the entry to the map.
25. A method for transferring data, comprising:
receiving a request conforming to a first data transfer protocol at an initiator node to transmit to a target node, wherein the request includes a request identifier in the first data transfer protocol;
obtaining a reference to a memory location to use for the request using a second data transfer protocol, wherein the reference is used by the second data transfer protocol;
adding an entry to a map associating the reference to the memory location for the second data transfer protocol with the request identifier for the first data transfer protocol; and
transferring, using the second data transfer protocol, the request with the request identifier and the reference to the memory location.
26. The method of claim 25, wherein the request originates at the initiator node and comprises a write command to write data from the initiator node to the target node to which the request is transferred using the second data transfer protocol, and wherein the reference comprises a write reference identifying initiator memory at the initiator node including the data to write to the target node.
27. The method of claim 26, wherein the map comprises an initiator map at the initiator node, further comprising:
receiving, at the target node, the request transferred using the second data transfer protocol, with the request identifier and the write reference;
adding an entry to a target map at the target node associating the write reference with the request identifier.
28. The method of claim 27, further comprising:
obtaining a read reference to a target memory location at the target node to receive the write data in the second data transfer protocol;
adding an entry to the target map associating the read reference with the request identifier; and
generating, at the target node, a read request in the second data transfer protocol specifying to transfer the data in the initiator memory referenced by the write reference to the target memory referenced by the read reference, wherein the target node transfers the read request to the initiator.
29. The method of claim 25, wherein the request originates at the initiator node and comprises a read command to read data from the target node to which the request is transferred using the second data transfer protocol, wherein the reference comprises a read reference identifying initiator memory at the initiator node into which the data from the target node is to be transferred.
30. The method of claims 26 and 29, further comprising:
receiving an invalidate message in the second data transfer protocol from the target node including one reference in the second data transfer protocol and the request identifier in the first data transfer protocol; and
invalidating the read or write reference not included in the invalidated message;
31. The method of claim 29, wherein the map comprises an initiator map at the initiator node, further comprising:
receiving, at the target node, the read request transferred using the second data transfer protocol, with the request identifier and the read reference; and
adding an entry to a target map at the target node associating the read reference with the request identifier.
32. The method of claim 31, further comprising:
identifying the requested data at the target node as a write reference;
adding an entry to the target map associating the identified write reference with the request identifier;
determining from the target map the read reference and the write reference; and
generating a write operation in the second data transfer protocol including the read reference and write reference to write the requested data to the initiator memory location referenced by the read reference from the location referenced by the read reference.
33. The method of claim 25, wherein the map comprises an initiator map, further comprising:
receiving an invalidate message in the second data transfer protocol from the target node including one reference in the second data transfer protocol and the request identifier in the first data transfer protocol;
invalidating, with adaptor hardware in the initiator node, the reference in the invalidate message;
determining, with an adaptor driver in the initiator node, from the map the at least one reference associated with the request identifier in the invalidate message; and
determining, with the adaptor driver, whether the invalidated reference in the invalidate message matches one reference in the determined at least one reference from the map;
invalidating, with the adaptor driver, one reference in the initiator map, and ignoring the error condition if the invalidated reference does not match the determined reference.
34. The method of claim 33, wherein the target node invalidates the references in the target node map related by the identifier in the first data transfer protocol.
35. The method of claim 33, wherein the request comprises a write request, wherein the map includes two entries associated with the request identifier, one write reference identifying initiator memory at the initiator node including the data to write and one read reference identifying target memory at the target node into which the data to write is transferred at the target, wherein the determined at least one reference comprises the write and read references, further comprising:
invalidating the reference in one of the two determined entries not included in the invalidate message.
36. The method of claim 25, wherein the request comprises a SCSI I/O command, wherein the first data transfer protocol comprises iSCSI, wherein the second data transfer protocol comprises RDMA, and wherein an iSER layer performs the operations of obtaining the reference to the memory location and adding the entry to the map.
US10/830,476 2004-04-21 2004-04-21 Method for communicating data transfer requests between data transfer protocols Expired - Fee Related US7526574B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/830,476 US7526574B2 (en) 2004-04-21 2004-04-21 Method for communicating data transfer requests between data transfer protocols

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/830,476 US7526574B2 (en) 2004-04-21 2004-04-21 Method for communicating data transfer requests between data transfer protocols

Publications (2)

Publication Number Publication Date
US20050240678A1 true US20050240678A1 (en) 2005-10-27
US7526574B2 US7526574B2 (en) 2009-04-28

Family

ID=35137768

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/830,476 Expired - Fee Related US7526574B2 (en) 2004-04-21 2004-04-21 Method for communicating data transfer requests between data transfer protocols

Country Status (1)

Country Link
US (1) US7526574B2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050240941A1 (en) * 2004-04-21 2005-10-27 Hufferd John L Method, system, and program for executing data transfer requests
US20060168094A1 (en) * 2005-01-21 2006-07-27 International Business Machines Corporation DIRECT ACCESS OF SCSI BUFFER WITH RDMA ATP MECHANISM BY iSCSI TARGET AND/OR INITIATOR
US20060181612A1 (en) * 2005-02-15 2006-08-17 Matsushita Electric Industrial Co., Ltd. Secure and private iSCSI camera network
US20080301311A1 (en) * 2007-05-30 2008-12-04 Caitlin Bestler Method and system for extended steering tags (stags) to minimize memory bandwidth for content delivery servers
US20090034553A1 (en) * 2004-07-16 2009-02-05 International Business Machines Corporation System and article of manufacture for enabling communication between nodes
US20120131124A1 (en) * 2010-11-24 2012-05-24 International Business Machines Corporation Rdma read destination buffers mapped onto a single representation

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7711539B1 (en) * 2002-08-12 2010-05-04 Netapp, Inc. System and method for emulating SCSI reservations using network file access protocols
US7921240B2 (en) * 2004-03-10 2011-04-05 Broadcom Corporation Method and system for supporting hardware acceleration for iSCSI read and write operations and iSCSI chimney
US7779081B2 (en) * 2004-07-16 2010-08-17 International Business Machines Corporation Method, system, and program for forwarding messages between nodes
US8122155B1 (en) * 2009-06-23 2012-02-21 Chelsio Communications, Inc. RDMA write completion semantics

Citations (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5495614A (en) * 1994-12-14 1996-02-27 International Business Machines Corporation Interface control process between using programs and shared hardware facilities
US6032224A (en) * 1996-12-03 2000-02-29 Emc Corporation Hierarchical performance system for managing a plurality of storage units with different access speeds
US20020029281A1 (en) * 2000-05-23 2002-03-07 Sangate Systems Inc. Method and apparatus for data replication using SCSI over TCP/IP
US6360282B1 (en) * 1998-03-25 2002-03-19 Network Appliance, Inc. Protected control of devices by user applications in multiprogramming environments
US6374248B1 (en) * 1999-12-02 2002-04-16 Sun Microsystems, Inc. Method and apparatus for providing local path I/O in a distributed file system
US20020059451A1 (en) * 2000-08-24 2002-05-16 Yaron Haviv System and method for highly scalable high-speed content-based filtering and load balancing in interconnected fabrics
US20020059309A1 (en) * 2000-06-26 2002-05-16 International Business Machines Corporation Implementing data management application programming interface access rights in a parallel file system
US20020084243A1 (en) * 2001-01-03 2002-07-04 Richard Hsiao Chemical mechanical polishing thickness control in magnetic head fabrication
US20020095547A1 (en) * 2001-01-12 2002-07-18 Naoki Watanabe Virtual volume storage
US20020124137A1 (en) * 2001-01-29 2002-09-05 Ulrich Thomas R. Enhancing disk array performance via variable parity based load balancing
US20030014544A1 (en) * 2001-02-15 2003-01-16 Banderacom Infiniband TM work queue to TCP/IP translation
US20030041211A1 (en) * 2001-03-07 2003-02-27 Merkey Jeffrey Vernon Dual axis RAID systems for enhanced bandwidth and reliability
US20030046396A1 (en) * 2000-03-03 2003-03-06 Richter Roger K. Systems and methods for managing resource utilization in information management environments
US20030058870A1 (en) * 2001-09-06 2003-03-27 Siliquent Technologies Inc. ISCSI receiver implementation
US20030061402A1 (en) * 2001-09-26 2003-03-27 Satyendra Yadav Method and apparatus enabling both legacy and new applications to access an InfiniBand fabric via a socket API
US20030067913A1 (en) * 2001-10-05 2003-04-10 International Business Machines Corporation Programmable storage network protocol handler architecture
US20030084209A1 (en) * 2001-10-31 2003-05-01 Chadalapaka Mallikarjun B. System and method for storage virtualization
US20030099254A1 (en) * 2000-03-03 2003-05-29 Richter Roger K. Systems and methods for interfacing asynchronous and non-asynchronous data media
US20030101239A1 (en) * 2001-11-27 2003-05-29 Takeshi Ishizaki Storage device with VLAN support
US20030131228A1 (en) * 2002-01-10 2003-07-10 Twomey John E. System on a chip for network storage devices
US20030135514A1 (en) * 2001-08-03 2003-07-17 Patel Sujal M. Systems and methods for providing a distributed file system incorporating a virtual hot spare
US20030135692A1 (en) * 2002-01-14 2003-07-17 Raidcore, Inc. Method and system for configuring RAID subsystems with block I/O commands and block I/O path
US20030165160A1 (en) * 2001-04-24 2003-09-04 Minami John Shigeto Gigabit Ethernet adapter
US20030172169A1 (en) * 2002-03-07 2003-09-11 Cheng Charles T. Method and apparatus for caching protocol processing data
US20030169690A1 (en) * 2002-03-05 2003-09-11 James A. Mott System and method for separating communication traffic
US20040034725A1 (en) * 2002-08-14 2004-02-19 Uri Elzur One shot RDMA having a 2-bit state
US20040073622A1 (en) * 2002-08-19 2004-04-15 Mcdaniel Scott S. One-shot RDMA
US20050198062A1 (en) * 2004-03-05 2005-09-08 Shapiro Richard B. Method and apparatus for accelerating data access operations in a database system
US20050240941A1 (en) * 2004-04-21 2005-10-27 Hufferd John L Method, system, and program for executing data transfer requests
US6983303B2 (en) * 2002-01-31 2006-01-03 Hewlett-Packard Development Company, Lp. Storage aggregator for enhancing virtualization in data storage networks
US20060067346A1 (en) * 2004-04-05 2006-03-30 Ammasso, Inc. System and method for placement of RDMA payload into application memory of a processor system
US7043578B2 (en) * 2003-01-09 2006-05-09 International Business Machines Corporation Method, system, and program for processing a packet including I/O commands and data
US7089293B2 (en) * 2000-11-02 2006-08-08 Sun Microsystems, Inc. Switching system method for discovering and accessing SCSI devices in response to query
US7299266B2 (en) * 2002-09-05 2007-11-20 International Business Machines Corporation Memory management offload for RDMA enabled network adapters

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003140840A (en) 2001-10-31 2003-05-16 Toshiba Corp Access method for network-connected disk array and storage device

Patent Citations (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5495614A (en) * 1994-12-14 1996-02-27 International Business Machines Corporation Interface control process between using programs and shared hardware facilities
US6032224A (en) * 1996-12-03 2000-02-29 Emc Corporation Hierarchical performance system for managing a plurality of storage units with different access speeds
US6360282B1 (en) * 1998-03-25 2002-03-19 Network Appliance, Inc. Protected control of devices by user applications in multiprogramming environments
US6374248B1 (en) * 1999-12-02 2002-04-16 Sun Microsystems, Inc. Method and apparatus for providing local path I/O in a distributed file system
US20030046396A1 (en) * 2000-03-03 2003-03-06 Richter Roger K. Systems and methods for managing resource utilization in information management environments
US20030099254A1 (en) * 2000-03-03 2003-05-29 Richter Roger K. Systems and methods for interfacing asynchronous and non-asynchronous data media
US20020029281A1 (en) * 2000-05-23 2002-03-07 Sangate Systems Inc. Method and apparatus for data replication using SCSI over TCP/IP
US20020059309A1 (en) * 2000-06-26 2002-05-16 International Business Machines Corporation Implementing data management application programming interface access rights in a parallel file system
US20020059451A1 (en) * 2000-08-24 2002-05-16 Yaron Haviv System and method for highly scalable high-speed content-based filtering and load balancing in interconnected fabrics
US7089293B2 (en) * 2000-11-02 2006-08-08 Sun Microsystems, Inc. Switching system method for discovering and accessing SCSI devices in response to query
US20020084243A1 (en) * 2001-01-03 2002-07-04 Richard Hsiao Chemical mechanical polishing thickness control in magnetic head fabrication
US20020095547A1 (en) * 2001-01-12 2002-07-18 Naoki Watanabe Virtual volume storage
US20020124137A1 (en) * 2001-01-29 2002-09-05 Ulrich Thomas R. Enhancing disk array performance via variable parity based load balancing
US20030014544A1 (en) * 2001-02-15 2003-01-16 Banderacom Infiniband TM work queue to TCP/IP translation
US20030070043A1 (en) * 2001-03-07 2003-04-10 Jeffrey Vernon Merkey High speed fault tolerant storage systems
US20030041211A1 (en) * 2001-03-07 2003-02-27 Merkey Jeffrey Vernon Dual axis RAID systems for enhanced bandwidth and reliability
US20030165160A1 (en) * 2001-04-24 2003-09-04 Minami John Shigeto Gigabit Ethernet adapter
US20030135514A1 (en) * 2001-08-03 2003-07-17 Patel Sujal M. Systems and methods for providing a distributed file system incorporating a virtual hot spare
US20030058870A1 (en) * 2001-09-06 2003-03-27 Siliquent Technologies Inc. ISCSI receiver implementation
US20030061402A1 (en) * 2001-09-26 2003-03-27 Satyendra Yadav Method and apparatus enabling both legacy and new applications to access an InfiniBand fabric via a socket API
US20030067913A1 (en) * 2001-10-05 2003-04-10 International Business Machines Corporation Programmable storage network protocol handler architecture
US20030084209A1 (en) * 2001-10-31 2003-05-01 Chadalapaka Mallikarjun B. System and method for storage virtualization
US20030101239A1 (en) * 2001-11-27 2003-05-29 Takeshi Ishizaki Storage device with VLAN support
US20030131228A1 (en) * 2002-01-10 2003-07-10 Twomey John E. System on a chip for network storage devices
US20030135692A1 (en) * 2002-01-14 2003-07-17 Raidcore, Inc. Method and system for configuring RAID subsystems with block I/O commands and block I/O path
US6983303B2 (en) * 2002-01-31 2006-01-03 Hewlett-Packard Development Company, Lp. Storage aggregator for enhancing virtualization in data storage networks
US20030169690A1 (en) * 2002-03-05 2003-09-11 James A. Mott System and method for separating communication traffic
US20030172169A1 (en) * 2002-03-07 2003-09-11 Cheng Charles T. Method and apparatus for caching protocol processing data
US20040034725A1 (en) * 2002-08-14 2004-02-19 Uri Elzur One shot RDMA having a 2-bit state
US20040073622A1 (en) * 2002-08-19 2004-04-15 Mcdaniel Scott S. One-shot RDMA
US7299266B2 (en) * 2002-09-05 2007-11-20 International Business Machines Corporation Memory management offload for RDMA enabled network adapters
US7043578B2 (en) * 2003-01-09 2006-05-09 International Business Machines Corporation Method, system, and program for processing a packet including I/O commands and data
US20050198062A1 (en) * 2004-03-05 2005-09-08 Shapiro Richard B. Method and apparatus for accelerating data access operations in a database system
US20060067346A1 (en) * 2004-04-05 2006-03-30 Ammasso, Inc. System and method for placement of RDMA payload into application memory of a processor system
US20050240941A1 (en) * 2004-04-21 2005-10-27 Hufferd John L Method, system, and program for executing data transfer requests

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7577707B2 (en) * 2004-04-21 2009-08-18 International Business Machines Corporation Method, system, and program for executing data transfer requests
US20050240941A1 (en) * 2004-04-21 2005-10-27 Hufferd John L Method, system, and program for executing data transfer requests
US8176187B2 (en) 2004-07-16 2012-05-08 International Business Machines Corporation Method, system, and program for enabling communication between nodes
US20090034553A1 (en) * 2004-07-16 2009-02-05 International Business Machines Corporation System and article of manufacture for enabling communication between nodes
US7761588B2 (en) 2004-07-16 2010-07-20 International Business Machines Corporation System and article of manufacture for enabling communication between nodes
US20100217878A1 (en) * 2004-07-16 2010-08-26 International Business Machines Corporation Method, system, and program for enabling communication between nodes
US20060168094A1 (en) * 2005-01-21 2006-07-27 International Business Machines Corporation DIRECT ACCESS OF SCSI BUFFER WITH RDMA ATP MECHANISM BY iSCSI TARGET AND/OR INITIATOR
US7426743B2 (en) * 2005-02-15 2008-09-16 Matsushita Electric Industrial Co., Ltd. Secure and private ISCSI camera network
US20060181612A1 (en) * 2005-02-15 2006-08-17 Matsushita Electric Industrial Co., Ltd. Secure and private iSCSI camera network
US20080301311A1 (en) * 2007-05-30 2008-12-04 Caitlin Bestler Method and system for extended steering tags (stags) to minimize memory bandwidth for content delivery servers
US8271669B2 (en) * 2007-05-30 2012-09-18 Broadcom Corporation Method and system for extended steering tags (STAGS) to minimize memory bandwidth for content delivery servers
US20120131124A1 (en) * 2010-11-24 2012-05-24 International Business Machines Corporation Rdma read destination buffers mapped onto a single representation
US8909727B2 (en) * 2010-11-24 2014-12-09 International Business Machines Corporation RDMA read destination buffers mapped onto a single representation

Also Published As

Publication number Publication date
US7526574B2 (en) 2009-04-28

Similar Documents

Publication Publication Date Title
US7577707B2 (en) Method, system, and program for executing data transfer requests
US7761588B2 (en) System and article of manufacture for enabling communication between nodes
US7966380B2 (en) Method, system, and program for forwarding messages between nodes
US7406481B2 (en) Using direct memory access for performing database operations between two or more machines
US7912988B2 (en) Receive queue device with efficient queue flow control, segment placement and virtualization mechanisms
US7519650B2 (en) Split socket send queue apparatus and method with efficient queue flow control, retransmission and sack support mechanisms
US9483188B2 (en) Multiple I/O request processing in a storage system
US7475167B2 (en) Offloading data path functions
US7734720B2 (en) Apparatus and system for distributing block data on a private network without using TCP/IP
US20040049603A1 (en) iSCSI driver to adapter interface protocol
US20050187939A1 (en) Method, system, and program for managing data read operations
US6898638B2 (en) Method and apparatus for grouping data for transfer according to recipient buffer size
US7526574B2 (en) Method for communicating data transfer requests between data transfer protocols
US20020078265A1 (en) Method and apparatus for transferring data in a network data processing system
CN114428586A (en) Storage interface command packets transmitted over fibre channel
AU2003300885B2 (en) Using direct memory access for performing database operations between two or more machines

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HUFFERD, JOHN LEWIS;KO, MICHAEL ANTHONY;REEL/FRAME:014850/0933;SIGNING DATES FROM 20040407 TO 20040412

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 4

SULP Surcharge for late payment
FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20210428